Chapter3_Internet Crime
Across
- 2. is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often a virus is attached to a file, so that when the infected file is opened, the virus executes
- 8. Type of attacker that Promote political ideology Cyberterrorist Destroy infrastructure components of financial
- 9. Type of attacker thatGain financially and/or disrupt company’s information systems and business operations
- 11. Type of attacker that Type of attacker Cause problems, steal data, and corrupt systems
- 12. software generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- 15. is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
- 16. Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
Down
- 1. Type of attacker that Capture trade secrets and gain competitive advantage Cybercriminal Gain financially
- 3. is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- 4. attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
- 5. attack is one in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- 6. is an attack on an information system that takes advantage of a particular system vulnerability.
- 7. is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- 10. is a harmful program that resides in the active memory of the computer and duplicates itself.
- 13. is a program in which malicious code is hidden inside a seemingly harmless program.
- 14. is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- 17. spam is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.